Chapter 9


Get Full Essay

Get access to this section to get all the help you need with your essay and educational goals.

Get Access
All of the following are top cyber crimes reported to the IC3 in 2012
Identify theft
Non-auction scam
Advance fee fraud
Which of the following is formaly defined as any criminal action perpetrated primarily through the use of a computer?
The Internet Crime Complaint Center (IC3) is a partnership between the _______.
FBI and National White Collar Crime Center
FBI-related scams involve_______.
people pretending to represent official gesture
Creating and distributing _________ is one of the most widespread types of cybercrimes.
computer viruses
What are virus categories?
Logic bomb
Which type of virus was the famous Michelangelo virus?
a time bomb
A(n)______ takes advantage of file transport methods to spread on its own.
A _______ is a virus that is attached to documents such as Word or Excel files
macro virus
Which of the following classifications of viruses can change its own code to avoid detection?
With regard to computer protection, quarantining is defined as _________.
placing a found virus in a secure area on the hard drive
A(n) _______ is the portion of virus code that is unique to a particular computer virus.
virus signature
_______ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
A _______ allows a hacker to gain access to your computer and take almost control of it without you knowledge
You can block logical ports from invaders and make your computer invisible to others on the internet by installing _______.
a firewall
Configuring a firewall to ignore all incoming packets that request access to a specific port is know as ______.
logical port blocking
Rules for creating passwords include all of the following:
Keep your password a secret
Change your password frequently
Use letters, numbers, and symbols in your passwords
CAPTCHA stands for ______.
Completely Automated Public Turing Test to Tell Computers and Humans Apart
FBI-related scams involve ________.
people pretending to represent official organizations
Adware and spyware are referred to collectively as ________.

Get access to
knowledge base

MOney Back
No Hidden
Knowledge base
Become a Member